Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-40140

In android_view_InputDevice_create of android_view_InputDevice.cpp, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVE
#android#google#java#auth

)]}’ { "commit": "2d88a5c481df8986dbba2e02c5bf82f105b36243", "tree": "6fe3bd910de991370a02c926861447a19172e1ac", "parents": [ “5a3d0c131175d923cf35c7beb3ee77a9e6485dad” ], "author": { "name": "Josep del Rio", "email": "[email protected]", "time": “Mon Jun 26 09:30:06 2023 +0000” }, "committer": { "name": "Android Build Coastguard Worker", "email": "[email protected]", "time": “Thu Aug 10 17:10:32 2023 +0000” }, "message": "Do not share key mappings with JNI object\n\nThe key mapping information between the native key mappings and\nthe KeyCharacterMap object available in Java is currently shared,\nwhich means that a read can be attempted while it\u0027s being modified.\n\nBug: 274058082\nTest: Patch tested by Oppo\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:3d993de0d1ada8065d1fe561f690c8f82b6a7d4b)\nMerged-In: I745008a0a8ea30830660c45dcebee917b3913d13\nChange-Id: I745008a0a8ea30830660c45dcebee917b3913d13\n", "tree_diff": [ { "type": "modify", "old_id": "9cc72437a0234a89063644ffe2ab29c1dd47e381", "old_mode": 33188, "old_path": "core/jni/android_view_InputDevice.cpp", "new_id": "f7c770e0bffb81d000ca79477c2fa674b44d66b4", "new_mode": 33188, "new_path": “core/jni/android_view_InputDevice.cpp” } ] }

Related news

CVE-2023-5801: November

Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907